First published: Thu Sep 29 2016(Updated: )
The integrated web server on Siemens SCALANCE M-800 and S615 modules with firmware before 4.02 does not set the secure flag for the session cookie in an https session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an http session.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
siemens scalance m-800 firmware | <=4.01 | |
Siemens SCALANCE M-800 | ||
Siemens Scalance S615 EEC Firmware | <=4.01 | |
Siemens SCALANCE S615 firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-7090 is rated as having a medium severity due to the potential risk of session cookie interception by attackers.
To mitigate CVE-2016-7090, upgrade the firmware of Siemens SCALANCE M-800 and S615 modules to version 4.02 or higher.
CVE-2016-7090 affects Siemens SCALANCE M-800 and S615 modules running firmware versions prior to 4.02.
The vulnerability in CVE-2016-7090 involves the integrated web server not setting the secure flag for the session cookie in HTTPS sessions.
Yes, CVE-2016-7090 can be exploited remotely by attackers intercepting the insecure cookie transmission over HTTP.